Person or Entity Authentication
Implement procedures to verify that a person or entity seeking access to ePHI is the one claimed.
Implementation Guidance
Required Documentation
Best Practices
Common Violations
Testing Procedures
Implementation Resources
Download expert-developed templates and checklists to implement this control:
Quick Facts
Related Controls
Explore other controls in the Technical Safeguards category.
Audit Controls
Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI....
Transmission Security
Implement technical security measures to guard against unauthorized access to ePHI that is being transmitted over an electronic communications network...
Access Control
Implement technical policies and procedures for electronic information systems that maintain ePHI to allow access only to those persons or software pr...
Need Help Implementing This Control?
Our certified HIPAA experts can help you implement this control correctly and efficiently.